← Back to blog

HashiCorp Vault in a Homelab: Secrets Without the Pain

HashiCorp Vault in a Homelab: Secrets Without the Pain

Secrets management is the unglamorous foundation of any secure infrastructure. This post covers how I run Vault in my homelab and the patterns that make it practical to live with day-to-day.

Why Vault?

Every alternative I tried either leaked secrets into git, required a cloud dependency, or was too manual to survive a reboot. Vault with AppRole auth gives me a repeatable, auditable secret store that works with Terraform, Ansible, and Jenkins.

Key Patterns

  • Dynamic Secrets: Vault generates short-lived PostgreSQL credentials on demand.
  • AppRole per Service: Each service has its own AppRole with scoped policies.